jackson-mapper-asl vulnerability CVE-2019-10172

jackson-mapper-asl vulnerability CVE-2019-10172 Security Advisory Security Advisory Description A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity ... More info: https://support.f5.com/csp/article/K39573629?utm_source=f5support&utm_medium=RSS

Rowhammer hardware vulnerability CVE-2020-10255

Rowhammer hardware vulnerability CVE-2020-10255 Security Advisory Security Advisory Description Modern DRAM chips (DDR4 and LPDDR4 after 2015) are affected by a vulnerability in deployment of ... More info: https://support.f5.com/csp/article/K60570139?utm_source=f5support&utm_medium=RSS

What’s a Web Shell and Why Is My Website Being Repeatedly Hacked?

Jim Walker Free Consultation by Phone We Fix Hacked Websites Fast (619) 479-6637. “What’s a web shell?” Most hacked websites have one or more web shell scripts added either during or after the site has been compromised. Web shell scripts, sometimes called backdoor scripts, often include a visual interface that may be used to upload, […] More info: https://hackrepair.com/blog/whats-a-web-shell-and-why-is-my-website-being-repeatedly-hacked

Episode 76: Ongoing Attacks on WP Growing in Volume Plus Numerous Plugin Vulnerabilities

On this week’s Think Like a Hacker podcast, we cover an active attack campaign targeting WordPress sites and numerous plugin vulnerabilities. This active attack campaign has been ongoing and has outpaced all other attacks on WordPress vulnerabilities. Our threat intelligence team has been tracking this attacker for months now, and we’re seeing these attacks intensifying. […] More info: https://www.wordfence.com/blog/2020/05/episode-76-ongoing-attacks-on-wp-growing-in-volume-plus-numerous-plugin-vulnerabilities/

MSA-20-0006: Remote code execution possible via SCORM packages

by Michael Hawkins. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution.Severity/Risk:SeriousVersions affected:3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versionsVersions fixed:3.8.3, 3.7.6, 3.6.10 and 3.5.12Reported by:Paul HoldenWorkaround:Disable the SCORM package activity type until the patch is applied.CVE More info: https://moodle.org/mod/forum/discuss.php?d=403513&parent=1628593

MSA-20-0005: MathJax URL upgraded to later version to remove XSS risk (upstream)

by Michael Hawkins. MathJax versions 2.7.2 and earlier contain a stored XSS risk. The MathJax URL has been updated to reference a newer version, which has the vulnerability patched.Severity/Risk:SeriousVersions affected:3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versionsVersions fixed:3.8.3, 3.7.6, 3.6.10 and 3.5.12Reported by:Abdullah HussamWorkaround:Manually update the MathJax URL in site administration to reference the patched version More info: https://moodle.org/mod/forum/discuss.php?d=403512&parent=1628590
Translate »